BTemplates.com

Powered by Blogger.

Pageviews past week

Quantum mechanics

Auto News

artificial intelligence

About Me

Recommend us on Google!

Information Technology

Popular Posts

Showing posts with label Twitter. Show all posts
Showing posts with label Twitter. Show all posts

Monday, September 12, 2011

Neuroscientists Find Famous Optical Illusion Surprisingly Potent


The yellow jacket (Rocky, the mascot of the University of Rochester) appears to be expanding. But he is not. He is staying still. We simply think he is growing because our brains have adapted to the inward motion of the background and that has become our new status quo.

The yellow jacket (Rocky, the mascot of the University of Rochester) appears to be expanding if you have just viewed concentric circles moving inwards. (Credit: Image courtesy of University of Rochester)

Similar situations arise constantly in our day-to-day lives -- jump off a moving treadmill and everything around you seems to be in motion for a moment.

This age-old illusion, first documented by Aristotle, is called the Motion Aftereffect by today's scientists. Why does it happen, though? Is it because we are consciously aware that the background is moving in one direction, causing our brains to shift their frame of reference so that we can ignore this motion? Or is it an automatic, subconscious response?

Davis Glasser, a doctoral student in the University of Rochester's Department of Brain and Cognitive Sciences thinks he has found the answer. The results of a study done by Glasser, along with his advisor, Professor Duje Tadin, and colleagues James Tsui and Christopher Pack of the Montreal Neurological Institute, is published in the journal Proceedings of the National Academy of Sciences (PNAS).

In their paper, the scientists show that humans experience the Motion Aftereffect even if the motion that they see in the background is so brief that they can't even tell whether it is heading to the right or the left.



Even when shown a video of a pattern that is moving for only 1/40 of a second (25 milliseconds) -- so short that the direction it is moving cannot be consciously distinguished -- a subject's brain automatically adjusts. If the subject is then shown a stationary object, it will appear to him as though it is moving in the opposite direction of the background motion. In recordings from a motion center in the brain called cortical area MT, the researchers found neurons that, following a brief exposure to motion, respond to stationary objects as if they are actually moving. It is these neurons that the researchers think are responsible for the illusory motion of stationary objects that people see during the Motion Aftereffect.

This discovery reveals that the Motion Aftereffect illusion is not just a compelling visual oddity: It is caused by neural processes that happen essentially every time we see moving objects. The next phase of the group's study will attempt to find out whether this rapid motion adaptation serves a beneficial purpose -- in other words, does this rapid adaptation actually improve your ability to estimate the speed and direction of relevant moving objects, such as a baseball flying toward you.



Recommend this story on Facebook, Twitter, and Google +1

Thursday, June 30, 2011

Why Do We Share Stories, News, and Information With Others?


People often share stories, news, and information with the people around them. We forward online articles to our friends, share stories with our co-workers at the water cooler, and pass along rumors to our neighbors. Such social transmission has been going on for thousands of years, and the advent of social technologies like texting, Facebook, and other social media sites has only made it faster and easier to share content with others. But why is certain content shared more than others and what drives people to share?


Well, according to Jonah Berger, the author of a new study published in Psychological Science, a journal of the Association for Psychological Science, the sharing of stories or information may be driven in part by arousal. When people are physiologically aroused, whether due to emotional stimuli or otherwise, the autonomic nervous is activated, which then boosts social transmission. Simply put, evoking certain emotions can help increase the chance a message is shared.

“In a prior paper, we found that emotion plays a big role in which New York Times articles make the most emailed list. But interestingly, we found that while articles evoking more positive emotions were generally more viral, some negative emotions like anxiety and anger actually increased transmission while others like sadness decreased it. In trying to understand why, it seemed like arousal might be a key factor,” says Berger, the Joseph G. Campbell Jr. Assistant Professor of Marketing at the University of Pennsylvania.

In the study, Berger suggests that feeling fearful, angry, or amused drives people to share news and information. These types of emotions are characterized by high arousal and action, as opposed to emotions like sadness or contentment, which are characterized by low arousal or inaction. “If something makes you angry as opposed to sad, for example, you’re more likely to share it with your family and friends because you’re fired up,” continues Berger.

Berger is especially interested in how social transmission leads online content to become viral. “There is so much interest in Facebook, Twitter, and other types or social media today,” he says, “but for companies and organizations to use these technologies effectively they need to understand why people talk about and share certain things.”



Two different experiments were conducted to test Berger’s theory that arousal promotes information sharing. In one experiment, which focused on specific emotions, 93 students completed what they were told were two unrelated studies. In the first study, students in different experimental groups watched video clips that made them either anxious or amused (high arousal emotions) or sad or content (low arousal emotions). In the second study, they were shown an emotionally neutral article and video and asked how willing they would be to share it with friends and family members. The results demonstrated that students who felt high arousal emotions were much more inclined to share with others.

The second experiment dealt with arousal more generally. 40 students were asked to complete what they assumed were two unrelated studies. First, they either sat still or jogged in place for about a minute – a task proven to increase arousal. Then they were asked to read a neutral online news article and told they could e-mail it to anyone they wanted. The findings showed that students who jogged in place and were aroused were more likely to e-mail the article to their friends and family, as opposed to the students that just sat still.

Berger states that the implications of this study are quite broad. “People’s behavior is heavily influenced by what others say and do. Whether you are a company trying to get people to talk more about your brand, or a public health organization trying to get people to spread your healthy eating message, these results provide insight into how to design more effective messages and communication strategies.”For more information about this study, please contact: Jonah Berger at jberger@wharton.upenn.edu.

Friday, June 24, 2011

Study brings brain-like computing a step closer to reality



The development of 'brain-like' computers has taken a major step forward today with the publication of research led by the University of Exeter.

Published in the journal Advanced Materials and funded by the Engineering and Physical Sciences Research Council, the study involved the first ever demonstration of simultaneous information processing and storage using phase-change materials. This new technique could revolutionise computing by making computers faster and more energy-efficient, as well as making them more closely resemble biological systems.

Computers currently deal with processing and memory separately, resulting in a speed and power 'bottleneck' caused by the need to continually move data around. This is totally unlike anything in biology, for example in human brains, where no real distinction is made between memory and computation. To perform these two functions simultaneously the University of Exeter research team used phase-change materials, a kind of semi-conductor that exhibits remarkable properties.

Their study demonstrates conclusively that phase-change materials can store and process information simultaneously. It also shows experimentally for the first time that they can perform general-purpose computing operations, such as addition, subtraction, multiplication and division. More strikingly perhaps it shows that phase-change materials can be used to make artificial neurons and synapses. This means that an artificial system made entirely from phase-change devices could potentially learn and process information in a similar way to our own brains.



Lead author Professor David Wright of the University of Exeter said: "Our findings have major implications for the development of entirely new forms of computing, including 'brain-like' computers. We have uncovered a technique for potentially developing new forms of 'brain-like' computer systems that could learn, adapt and change over time. This is something that researchers have been striving for over many years."

This study focused on the performance of a single phase-change cell. The next stage in Exeter's research will be to build systems of interconnected cells that can learn to perform simple tasks, such as identification of certain objects and patterns.


More information: Arithmetic and Biologically-Inspired Computing Using Phase-Change Materials, DOI: 10.1002/adma.201101060

Abstract

Phase-change materials offer a promising route for the practical realisation of new forms of general-purpose and ‘brain-like’ computers. An experimental proof-of-principle of such remakable capabilities is presented that includes (i) the reliable execution by a phase-change ‘processor’ of the four basic arithmetic functions of addition, subtraction, multiplication and division, (ii) the demonstration of an ‘integrate and fire’ hardware neuron using a single phase-change cell and (iii) the expostion of synaptic-like functionality via the ‘memflector’, an optical analogue of the memristor.

Provided by University of Exeter

Thursday, June 23, 2011

What to Do If Your Online Account's Been Hacked



Dylan Valade owns a Web design and software business. As part of his business, he deals with Web and network security issues every day.

One day, Valade received a confirmation email from a brokerage account letting him know that a trade had been made. That would have been fine, except for one thing.

"In this case, a stock had been sold that I did not sell," Valade said.

Recognizing that the account had been compromised, Valade changed all of his passwords immediately.

"My brokerage account was closed and a new one was opened," he added. "The equities were transferred to the new account, with a new login and password."

Valade's experience happened on a brokerage site, but any online account can be a target.

"The most valuable targets are financial services like PayPal, online bank accounts and investment accounts," explained Morgan Slain of Los Gatos, Calif.-based SplashData. "Facebook, LinkedIn, and other social networking sites are increasingly common targets. Online email accounts, including Gmail and Yahoo! Mail, are often hacked too."

The most sophisticated hackers actually don't target individual accounts, but instead go after repositories of account data on servers owned by large organizations, which is why companies such as Sony and Epsilon, a major email forwarder, are targeted.



What the hackers are looking to steal depends on the type of account they are hacking into. When banks or financial services such as PayPal are targeted, the objective is to steal money.

"But often the hacker has a larger objective than attacking one individual," said Lance James, director of intelligence at New York's Vigilant. "In most cases, they're gaining access to email or social network accounts specifically to enable further distribution of their activity, or to steal information that will give them access to other places — potentially more valuable places. For example, a hacker might conduct a series of intrusions with the aim of getting into an employer's payroll system."

If one of your online accounts has been hacked, it compromises the overall integrity of your computer, James added. This comes with two primary manners of impact.

"First, if there [was] personal or confidential information on that system, the owner must assume it has been hijacked by criminals," he explained. "This could have long-lasting effects including identity theft, credit fraud, bank account theft and misplaced trust between friends and associates.

"Second — in some ways more detrimental in terms of reach — that compromised computer can be used to launch attacks against others, expanding the sphere of impact geometrically," James said. "It is therefore the responsibility of organizations and every individual to take precautions wherever they can."

The surest sign that your account has been compromised is unusual activity.

"For a financial account like PayPal, the most obvious sign that your account has been compromised are suspicious transactions," said Kevin McNamee, security architect at Kindsight of Mountain View, Calif. "You should regularly check your account to look for any unauthorized transactions and report them immediately.

"For social networking services like Facebook," McNamee added, "you may notice unusual activity on your wall, but the most likely indication that something is wrong is when your friends ask why you’ve been sending them unusual links and email messages."

Some things to look for, according to Chris Boyd, senior threat researcher at GFI Software of Cary, N.C., include:

— Friends are asking you about random requests for money or messages that you've apparently sent them, claiming that you're stranded somewhere – for example, messages saying you got mugged in London. Scammers use this tactic for financial fraud. This is an especially popular tactic where compromised Facebook accounts are concerned, due to exploiting the trust of friends and family.

— Strange messages are posted from your Twitter account promoting websites and offers that you're unaware of.

— You find you're selling items on eBay that you didn't list.

If you find that one of your accounts has been compromised, the first step is to ensure that no additional damage can be done, McNamee suggested.

If you still have access to the account, change the password immediately. And then change the passwords to other online accounts, especially for any accounts that share an email address and/or a password with the compromised account.

Also, said McNamee, contact the organization that operates the service and let them know that your account has been compromised.

"Their website will provide information on how to report a problem and regain control over your account," he said.

If the account that was compromised held any financial data or credit/debit card information, James said it's best to contact the financial institutions and cancel the cards.

Even the most vigilant computer user is at risk for an attack. But Asaf Greiner, vice president of products at Sunnyvale, Calif.'s Commtouch, provided the following tips that will keep your accounts less vulnerable to a hacker:

— Use different passwords for different accounts, so if you lose one, you don't lose them all.

— Use strong passwords (e.g. ones that are hard to guess), especially with more valuable resources, such as bank accounts. When possible, use multiple-factor authentication, as with a code-number-generating token. If you find passwords hard to remember, use a password vault application to remember them for you.

— Install all recommended software patches and updates – and anti-virus software – on machines you manage.

— Don't log into valuable accounts from public machines or from unencrypted Wi-Fi networks.


Thursday, February 11, 2010

Friday, March 13, 2009

5 deadliest hacking subject lines


Given the surfeit of new threats – ‘Hacking’, it would not be a bad idea for most of the Internet surfers to reconsider their online habits. With the Net being increasingly used by a large number of people for various bill payments, banking, investments, ticket bookings and reservations, e-commerce, social networking, communication and much more, it is time people paid heed to the threat of dangers lurking around at every step, and form a counter strategy.

It is critical to know these lurking threats so that you don't fall prey to scamsters and fraudsters and compromise your security and monies. Here is a list of some of the common tricks played by scammers.

`You have not paid for the item you recently won on eBay. Please click here to pay.’

Many consumers visit auction sites to find gifts or personal buying. But such shoppers must be aware of scammers who use auction sites to find their preys. A very common trick according to CSO, are mails notifying the users that he has 'not paid for the item you recently won on the site. Please click here to pay.' These emails impersonate complaints from the popular auction sites for non-payment of winning bids. People using online auction sites often bid days before a purchase is complete. So, it is not difficult for a person to believe that he has forgotten about a bid he made a week before.

Experts believe that such phising mails play on a person's concerns about the negative impact this may have on their auction site score. Like in case of eBay, people generally spend years building eBay feedback score or `reputation,' hence the chances are that they will quickly react to such emails. Many consumers visit auction sites to find gifts or personal buying. But such shoppers must be aware of scammers who use auction sites to find their preys. A very common trick according to CSO, are mails notifying the users that he has 'not paid for the item you recently won on the site. Please click here to pay.' These emails impersonate complaints from the popular auction sites for non-payment of winning bids. People using online auction sites often bid days before a purchase is complete. So, it is not difficult for a person to believe that he has forgotten about a bid he made a week before.

Experts believe that such phising mails play on a person's concerns about the negative impact this may have on their auction site score. Like in case of eBay, people generally spend years building eBay feedback score or `reputation,' hence the chances are that they will quickly react to such emails.

`You've been let go. Click here to register for severance pay.'

Scammers are finding novel ways to cash on the present downturn. This trick comes from the same. The mounting number of layoffs has made employees anxious about their jobs. This is what fraudsters are exploiting on.

The message appears to have come from HR dept (cons employer's email ID) and often says: You have been let go due to a layoff. If you wish to register for severance please register here.' Little surprisingly, the message carries a malicious link.

`This mail is Shivram from tech services. Your PC is infected.’

This is another common trick that scammers play. To cause maximum damage, such mails usually coincide with a related event. This means during the time of a widespread malware attack or a virus spread (say during the recent Downadup worm attack).

In such messages, hackers paint a destructive image of the damage that the worm attack can cause to the user. The aim is to exploit and cash on people's fear and uncomfort with technology.
`Someone has a secret crush on you! Click on this link to find who it is!’

This is one of the oldest tricks. But still seems to be working. The message seems to come from a dating or a social networking site and asks the reader to click on a link or download an application.

Sadly, in ninety percent of such cases, after clicking on the link, you not only don't find your secret admirer, -- you also download malicious software that you can't even detect. Of course, it's designed to steal personal and financial information. Stay away from such "secret admirers".

`Did you see this video of you? Check out this link!’


This is another popular scam. Security experts are seeing an increase in such spam, especially on Twitter, the popular microbloging site.

A recent spam campaign on Twitter read: "Did you see this video of you?" Thinking it to be from a friend many users ended up clicking on it and landed up at a fake Twitter site. Once there, unsuspecting users entered passwords, which then ended up in the hands of hackers.

(Courtesy: Indiatimes.Infotech)


If you like this post, buy me a beer at $3!
Reblog this post [with Zemanta]